Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2020
/
Article
/
Tab 2
/
Research Article
Highly Secure Privacy-Preserving Outsourced
k
-Means Clustering under Multiple Keys in Cloud Computing
Table 2
The summary of schemes.
Scheme
S/AS
Multiple data owners
Multiple keys
Cipher comparison
Security
Multidimensional data
[22]
AS
[23]
S
[26]
AS
[30]
AS
[34]
AS
[19]
AS
Ours
AS
S/AS: symmetric/asymmetric.